↓ Skip to main content

Information Security and Cryptology - ICISC 2003

Overview of attention for book
Cover of 'Information Security and Cryptology - ICISC 2003'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Binary Tree Encryption: Constructions and Applications
  3. Altmetric Badge
    Chapter 2 A Separable Threshold Ring Signature Scheme
  4. Altmetric Badge
    Chapter 3 On the Security of a Group Signature Scheme with Forward Security
  5. Altmetric Badge
    Chapter 4 An Efficient Strong Designated Verifier Signature Scheme
  6. Altmetric Badge
    Chapter 5 Sound Computational Interpretation of Formal Encryption with Composed Keys
  7. Altmetric Badge
    Chapter 6 On the Security of a New Variant of OMAC
  8. Altmetric Badge
    Chapter 7 New Methods to Construct Cheating Immune Functions
  9. Altmetric Badge
    Chapter 8 Yet Another Definition of Weak Collision Resistance and Its Analysis
  10. Altmetric Badge
    Chapter 9 Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2
  11. Altmetric Badge
    Chapter 10 A General Expansion Method Using Efficient Endomorphisms
  12. Altmetric Badge
    Chapter 11 Design of Bit Parallel Multiplier with Lower Time Complexity
  13. Altmetric Badge
    Chapter 12 Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks
  14. Altmetric Badge
    Chapter 13 Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion
  15. Altmetric Badge
    Chapter 14 Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks
  16. Altmetric Badge
    Chapter 15 Extended Role Based Access Control and Procedural Restrictions
  17. Altmetric Badge
    Chapter 16 Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System
  18. Altmetric Badge
    Chapter 17 Secure Double Auction Protocols with Full Privacy Protection
  19. Altmetric Badge
    Chapter 18 Sealed-Bid Auctions with Efficient Bids
  20. Altmetric Badge
    Chapter 19 Providing Receipt-Freeness in Mixnet-Based Voting Protocols
  21. Altmetric Badge
    Chapter 20 Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption
  22. Altmetric Badge
    Chapter 21 Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks
  23. Altmetric Badge
    Chapter 22 Analysis of the Bounds for Linear Block Codes in Watermark Channel
  24. Altmetric Badge
    Chapter 23 Security Analysis of Some Proxy Signatures
  25. Altmetric Badge
    Chapter 24 A More Secure and Efficacious TTS Signature Scheme
  26. Altmetric Badge
    Chapter 25 An Efficient Revocation Algorithm in Group Signatures
  27. Altmetric Badge
    Chapter 26 Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
  28. Altmetric Badge
    Chapter 27 Group Oriented Cryptosystems Based on Linear Access Structures
  29. Altmetric Badge
    Chapter 28 A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters
  30. Altmetric Badge
    Chapter 29 Non-interactive Deniable Ring Authentication
  31. Altmetric Badge
    Chapter 30 Differential Cryptanalysis of TEA and XTEA
  32. Altmetric Badge
    Chapter 31 A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher
  33. Altmetric Badge
    Chapter 32 New Block Cipher: ARIA
  34. Altmetric Badge
    Chapter 33 Truncated Differential Attacks on 8-Round CRYPTON
Attention for Chapter 30: Differential Cryptanalysis of TEA and XTEA
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age and source

Mentioned by

wikipedia
4 Wikipedia pages

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
40 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Differential Cryptanalysis of TEA and XTEA
Chapter number 30
Book title
Information Security and Cryptology - ICISC 2003
Published in
Lecture notes in computer science, November 2003
DOI 10.1007/978-3-540-24691-6_30
Book ISBNs
978-3-54-021376-5, 978-3-54-024691-6
Authors

Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 40 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Spain 1 3%
Unknown 39 98%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 14 35%
Student > Master 8 20%
Student > Bachelor 3 8%
Professor 3 8%
Researcher 2 5%
Other 5 13%
Unknown 5 13%
Readers by discipline Count As %
Computer Science 25 63%
Engineering 4 10%
Physics and Astronomy 2 5%
Mathematics 1 3%
Unknown 8 20%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 24 February 2023.
All research outputs
#7,699,921
of 23,420,064 outputs
Outputs from Lecture notes in computer science
#2,494
of 8,156 outputs
Outputs of similar age
#33,963
of 134,762 outputs
Outputs of similar age from Lecture notes in computer science
#49
of 115 outputs
Altmetric has tracked 23,420,064 research outputs across all sources so far. This one is in the 44th percentile – i.e., 44% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,156 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.1. This one has gotten more attention than average, scoring higher than 54% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 134,762 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 17th percentile – i.e., 17% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 115 others from the same source and published within six weeks on either side of this one. This one is in the 35th percentile – i.e., 35% of its contemporaries scored the same or lower than it.